File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ISWPC.2006.1613586
- Scopus: eid_2-s2.0-33750397274
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: DelPHI: wormhole detection mechanism for ad hoc wireless networks
Title | DelPHI: wormhole detection mechanism for ad hoc wireless networks |
---|---|
Authors | |
Keywords | Security Wormhole Tunnel Ad hoc Wireless |
Issue Date | 2006 |
Publisher | IEEE. |
Citation | The 1st International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 16-18 January 2006 How to Cite? |
Abstract | In mobile ad hoc networks, data transmission is performed within an untrusted wireless environment. Various kinds of attack have been identified and corresponding solutions have been proposed. Wormhole attack is one of the serious attacks which forms a serious threat in the networks, especially against many ad hoc wireless routing protocols and location-based wireless security system. We identify two types of wormhole attacks. In the first type, malicious nodes do not take part in finding routes, meaning that, legitimate nodes do not know their existence. In the second type, malicious nodes do create route advertisements and legitimate nodes are aware of the existence of malicious nodes, just do not know they are malicious. Some researchers have proposed detection mechanisms for the first type. In this paper, we propose an efficient detection method called delay per hop indication (DelPHI). By observing the delays of different paths to the receiver, the sender is able to detect both kinds of wormhole attacks. This method requires neither synchronized clocks nor special hardware equipped mobile nodes. The performance of DelPHI is justified by simulations. |
Persistent Identifier | http://hdl.handle.net/10722/45913 |
ISBN | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chiu, HS | en_HK |
dc.contributor.author | Wong Lui, KS | en_HK |
dc.date.accessioned | 2007-10-30T06:38:21Z | - |
dc.date.available | 2007-10-30T06:38:21Z | - |
dc.date.issued | 2006 | en_HK |
dc.identifier.citation | The 1st International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 16-18 January 2006 | en_HK |
dc.identifier.isbn | 0-7803-9410-0 | - |
dc.identifier.uri | http://hdl.handle.net/10722/45913 | - |
dc.description.abstract | In mobile ad hoc networks, data transmission is performed within an untrusted wireless environment. Various kinds of attack have been identified and corresponding solutions have been proposed. Wormhole attack is one of the serious attacks which forms a serious threat in the networks, especially against many ad hoc wireless routing protocols and location-based wireless security system. We identify two types of wormhole attacks. In the first type, malicious nodes do not take part in finding routes, meaning that, legitimate nodes do not know their existence. In the second type, malicious nodes do create route advertisements and legitimate nodes are aware of the existence of malicious nodes, just do not know they are malicious. Some researchers have proposed detection mechanisms for the first type. In this paper, we propose an efficient detection method called delay per hop indication (DelPHI). By observing the delays of different paths to the receiver, the sender is able to detect both kinds of wormhole attacks. This method requires neither synchronized clocks nor special hardware equipped mobile nodes. The performance of DelPHI is justified by simulations. | en_HK |
dc.format.extent | 2081424 bytes | - |
dc.format.extent | 1768 bytes | - |
dc.format.extent | 4014 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | text/plain | - |
dc.format.mimetype | text/plain | - |
dc.language | eng | en_HK |
dc.publisher | IEEE. | en_HK |
dc.relation.ispartof | International Symposium on Wireless Pervasive Computing Proceedings | - |
dc.rights | ©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Security | en_HK |
dc.subject | Wormhole | en_HK |
dc.subject | Tunnel | en_HK |
dc.subject | Ad hoc | en_HK |
dc.subject | Wireless | en_HK |
dc.title | DelPHI: wormhole detection mechanism for ad hoc wireless networks | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Lui, KS: kslui@eee.hku.hk | - |
dc.identifier.authority | Lui, KS=rp00188 | - |
dc.description.nature | published_or_final_version | en_HK |
dc.identifier.doi | 10.1109/ISWPC.2006.1613586 | en_HK |
dc.identifier.scopus | eid_2-s2.0-33750397274 | - |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-33750397274&selection=ref&src=s&origin=recordpage | - |
dc.identifier.scopusauthorid | Chiu, HS=7401986712 | - |
dc.identifier.scopusauthorid | Lui, KS=7103390016 | - |
dc.customcontrol.immutable | sml 160111 - merged | - |